R0106-HP MSR Router Series Layer 3 - IP Services Configuration Guide(V7)

315
2. The server compares the algorithm list of the client to its own algorithm list in priority order.
3. The server sends the matching algorithms to the client.
If no match is found, the negotiation fails.
4. The server and the client generate encryption and authentication keys based on the pre-shared
key.
If authentication and encryption are not needed, they do not generate keys.
5. The server and the client exchange negotiation acknowledgment packets protected by using the
keys.
6. The server and the client use the keys to protect subsequent traffic if they can restore the protected
negotiation acknowledgment packets.
If they cannot restore the packets, the negotiation fails.
Figure 132 Initialization process
Registration phase
Figure 133 shows the registration process:
1. The client sends a registration request that includes its public and private addresses to the server.
2. The server sends the client an identity authentication request that specifies the authentication
algorithm.
If authentication is not required, the server directly registers the client and sends the client a
registration acknowledgement. VAM supports both PAP and CHAP authentication.
3. The client submits its identity information to the server.
4. The server performs authentication and accounting for the client through the AAA server.
5. The server sends a registration acknowledgement that includes the hub information to the client.
Figure 133 Registration process
Client Server
1) Registration request
2) Identity authentication request
3) Identity information
4) Registration acknowledgement